Spedizione gratuita con Packeta per un prezzo superiore a 79.99 €
BRT 7.99 Punto BRT 7.99 DHL 7.99 HR Parcel 7.49 GLS 3.99

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

Lingua IngleseInglese
Libro In brossura
Libro Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals James C. Foster
Codice Libristo: 04831957
Casa editrice Syngress Media,U.S., aprile 2005
The book is logically divided into 5 main categories with each category representing a major skill s... Descrizione completa
? points 189 b
79.95
Magazzino esterno Inviamo tra 9-12 giorni

30 giorni per il reso


Potrebbe interessarti anche


I MIGLIORI
Hacienda Peter Hook / In brossura
common.buy 13.26
I MIGLIORI
Sandman Omnibus Vol. 1 Neil Gaiman / Rigido
common.buy 128.87
Brain: A User's Manual Marco Magrini / In brossura
common.buy 17.12
Great Escapes Lonely Planet / Rigido
common.buy 66.57
Dzieła zebrane tom 12 Korespondencja Herling-Grudziński Gustaw / Rigido
common.buy 25.79
Inspiring Economics Bruno S. Frey / Rigido
common.buy 134.76
Vinyl Enigma Robert Love / In brossura
common.buy 16.26
Computational Complexity Oded Goldreich / Rigido
common.buy 118.16
Die Staatssymbolik des neuen Russland Isabelle de Keghel / In brossura
common.buy 29.00
Sexual Morality John S J Piderit / In brossura
common.buy 55.12
Bioethics Howard B. Radest / Rigido
common.buy 173.61

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and UDP, sockets are implemented differently in nearly ever language. 3. Shellcode - Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access. 4. Porting - Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not "recreate the wheel. 5. Coding Tools - The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications. *Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits. *Perform zero-day exploit forensics by reverse engineering malicious code. *Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks.

Informazioni sul libro

Titolo completo Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
Lingua Inglese
Rilegatura Libro - In brossura
Data di pubblicazione 2005
Numero di pagine 696
EAN 9781597490054
Codice Libristo 04831957
Casa editrice Syngress Media,U.S.
Peso 1474
Dimensioni 203 x 252 x 36
Regala questo libro oggi stesso
È facile
1 Aggiungi il libro al carrello e scegli la consegna come regalo 2 Ti invieremo subito il buono 3 Il libro arriverà all'indirizzo del destinatario

Accesso

Accedi al tuo account. Non hai ancora un account Libristo? Crealo ora!

 
obbligatorio
obbligatorio

Non hai un account? Ottieni i vantaggi di un account Libristo!

Con un account Libristo, avrai tutto sotto controllo.

Crea un account Libristo